|Publication number||US6754891 B1|
|Application number||US 09/656,776|
|Publication date||Jun 22, 2004|
|Filing date||Sep 7, 2000|
|Priority date||Aug 31, 1998|
|Publication number||09656776, 656776, US 6754891 B1, US 6754891B1, US-B1-6754891, US6754891 B1, US6754891B1|
|Inventors||Michael Snyder, Jim Blandy|
|Original Assignee||Red Hat, Inc.|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (24), Non-Patent Citations (7), Referenced by (56), Classifications (10), Legal Events (4)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This application is a continuation, divisional, of application Ser. No. 09/144,184, filed Aug. 31, 1998 now abandoned.
1. Field of the Invention
The present invention generally relates to debugger systems for computer software.
2. Description of the Prior Art
During the coding of computer programs, the inadvertent production of errors, or bugs, is typically unavoidable. Debugging systems help identify, and thus eliminate, these bugs from a computer program.
One tool used with debuggers are breakpoints. Breakpoints are stopping locations in a computer program under test. The computer program will run until it reaches a predetermined breakpoint address; control is then returned to the debugger. At this point, the debugger can examine the memory locations used by the computer program under test. By examining these memory locations, the user can locate and eliminate bugs in the computer program under test.
There are difficulties with breakpoints, however. For example, some computer systems are parts of systems in which the computer system under test provides and receives data from another part of the system within a certain time restriction. The breakpoints can thus cause timing problems. Sometimes it is not feasible for the computer user to be around during the testing of the computer system. For example, if a breakpoint is set at a location where it is unlikely for the program to hit, it would not make sense for the computer user to sit at the computer screen waiting for such an unlikely event. Additionally, some testing of the computer system can occur late at night when the software engineers are not available.
One way to avoid these problems is through the use of tracepoints. Tracepoints are similar to breakpoints, but unlike breakpoints, they do not stop the program indefinitely. Once the program reaches a tracepoint, data in predetermined memory locations are stored. Control is then returned to the computer program under test. After the computer program has run, a “hex dump” of all the data obtained by the tracepoints is provided to the user. The user sifts through the hexadecimal representation of the data in order to determine the bugs in the computer system. It is desired to have an improved tracepointing system for examining a computer program under test.
One embodiment of the present invention relates to the use of programming abstractions to represent the tracepoint output as well as the data to collect at each tracepoint event. This makes it easier for the user of the debugging system to collect and evaluate the tracepoint event data. The user does not have to sift through the hexadecimal representations in order to determine the locations of and contents of memory. For example, if a variable, X, is used in the source code of the computer program under test, the debugger system can interpret the user's command “collect X” at a given tracepoint to collect the data stored in the memory location associated with the variable, X. Later, an instruction to “print X” will cause the debugging software to display the value of X. The user need not look up the address of variable X, then look at the contents of that address; the debugger system does this automatically for the user.
In a preferred embodiment, the system can collect data from the stack and then produce an output indicating what subroutine called which, and with what arguments, at the time of the tracepoint event.
In a preferred embodiment, the debugger system uses a programming abstraction, such as a variable used in the source code of the program under test, and checks the address and symbol table created during the compiling of the computer program under test to determine some indication of the addresses of the required data. This indication is sent to a debugger agent (a subprogram running on the target system that provides services for the debugger on the host computer) along with the computer program under test. The debugger agent in the target system collects the desired data and stores the data into a buffer when a tracepoint is executed. After the computer program under test has run, the debugger system can send a request to the debugger agent on the target to obtain the data in the buffer. The debugger can then represent the data using programming abstractions. In a preferred embodiment, both the collection and display representations of the data uses the symbol and address table created by the compiler for the compiled program under test.
In another embodiment of the present invention, the system includes bytecode expressions that are run as part of the tracepoint collecting of data at the target system. The target system can evaluate expressions in order to determine the data to collect. For example, consider an array Q[n] which has 100 elements. If the user wants to collect the data in the location Q[X+Y], where X and Y are both program variables, the present invention can evaluate X+Y in order to determine the address location of the array value Q[X+Y] in order to obtain this value and store it in the buffer. In this way, less data need be stored. For example, if only the element Q[X+Y] is required, the system need not store all 100 elements of the array each time the tracepoint is hit. This is an important consideration because the data storage capacity of the buffer at the target system is an important limiting factor. A given tracepoint could be hit a large number of times. By using bytecode expressions, the buffer is not filled with unwanted data. and thus filled prematurely.
Having the arithmetic expression evaluated at the target system rather than at the debugger is important. In breakpoint systems, typically the evaluation of expressions is done at the debugger. This is undesirable when using tracepoints that operate in real time because the arithmetic calculations of the expressions at the target system can occur much faster than the data transfer between the target system and the host system. For the same reason, the debugger agent stores the data into a buffer, rather than sending the data directly to the host system at the time of a tracepoint event.
The present invention may be further understood from the following description in conjunction with the appended drawings. In the drawings:
FIG. 1 is a diagram illustrating the host computer and the target system;
FIG. 2 is a flow chart illustrating a method of the present invention;
FIG. 3 is a diagram illustrating an example of the operation of the system of the present invention; and
FIGS. 4A and 4B are diagrams illustrating-details of the example of FIG. 3;
FIG. 1 shows an example of a system 20 of the present invention. The system 20 includes a host computer 22 and a target system 24. The host computer 22 is typically a workstation or personal computer. The target system 24 is typically an embedded system.
The user input 30 is a representation of the tracepoints and the data requested to be collected at the tracepoint. The user input is expressed using programming abstractions, such as symbols, variables, and expressions, in addition to register and address numbers. Programming abstractions are defined as symbolic representations that exclude purely numeric representations such as hexadecimal representations of address. As will be discussed below, the programming abstractions can include symbols and addresses contained in the symbol and address table 26 which is produced during the compiling of the target program. The debugger 32 interprets the programming abstractions to produce a description of the address of the tracepoints and the data to be collected. This description is then sent to the debugger agent 34 on the target system 24.
The debugger agent 34 produces the tracepoint links into the target program 28. Program code for storing data into the memory 36 when a tracepoint event occurs is contained in the debugger agent 34 as well. The debugger agent 34 can execute bytecode for doing arithmetic operations. These bytecodes allow the debugger agent 34 to calculate addresses of data to be stored.
During the operation of the target program 28, when a tracepoint is reached, control is given to the debugger agent 34. The debugger agent 34 can calculate the addresses of the data to be collected and store this data into the buffer 36. After target program has run, the user can input a request to find the data associated with a given tracepoint event. This request can use programming abstractions. The request is sent to the debugger 32 and interpreted using the symbols and address table 26. The debugger then instructs debugger agent 34 to get the desired data from the buffer. The data is interpreted and then displayed in display 38.
FIG. 2 is a flow chart illustrating a method of the present invention. In step 40, a target program is compiled to produce the table of symbols and addresses. The production of the table of symbols and addresses during the compiling of a computer program is well known.
In step 42, the target program is sent to the target computer. In step 44, the debugger is used to produce the description of the tracepoints and the data that is to be collected at that tracepoint. This description is sent to the target program in step 46. In step 48, the debugger agent adds the tracepoints to the target program. An instruction in the tracepoint location is removed from the target program, and replaced by a jump to a portion of the debugger agent.
In step 50, the target program is run. When the tracepoints are reached, some of the program registers can be saved, any arithmetic expressions are evaluated, and then data is saved into the buffers. Next, the registers are returned to their original condition. The written over instruction in the first location is replaced and executed and the jump written back.
Arithmetic expressions may be evaluated at the target computer to get the addresses of the data to be stored. After running the target program, the debugger can be set to examine the tracepoint data in step 52. In step 54, the debugger evaluates the user input using the table of symbols and addresses to request data from the debugger agent.
Looking at FIG. 2B, in step 56, the debugger agent gets data from the buffer and sends it to the debugger. In step 58, the debugger uses programming abstractions to expresses the requested data associated with a tracepoint event.
FIG. 3 illustrates an example of the operation of the system of the present invention. The user inputs the tracepoint location and the data that is desired to be collected, as shown in block 60. A representation of the tracepoint location and the data to be collected in sent to the debugger agent. The debugger agent will produce a table of locations 62 of data to store in the buffer 64, such as the variables X, Y, and Q[X+Y]. The location of Q[X+Y] requires a calculation of the value, X+Y, to determine an offset into the array starting address and point to the array element to be stored. In one embodiment, the PC is automatically stored in the first location of the buffer at the start of a tracepoint. In this example, the second location of the frame stores the value X, the third location stores the value Y, and the fourth location stores the value of Q[X +Y], the third location stores the value Y, and the fourth location stores the value of Q[x +Y]. In block 66, the user input “tfind5”, sets the trace frame to frame 5. The request “print Q[X+Y]” is interpreted and instructions are sent to the debugger agent, which goes to frame 5 in the buffer and gets the value of Q[X+Y], which is the fourth data in the frame 5, as shown in block 68. Note that user request “print Q[X+Y]” includes the programming abstraction Q[X+Y]. In block 70, the debugger displays the value of Q[x+Y].
The buffer 64 is typically of a fixed size, and is divided into frames. The frames are used to store the data collected at each tracepoint event. The frames are of variable size since a different amount of data can be collected at each tracepoint.
In one embodiment, the user can preselect whether no more tracepoint data is collected when the buffer is full or whether the system wraps-around, overwriting parts of the buffer. If the system does not write over buffer data, only the first set of tracepoint data is available. If the system wraps-around the buffer, only the last set of tracepoint data is available.
As shown in FIG. 3, the system can be set up to automatically collect the program counter (PC) at the tracepoint. The system could also be set up to automatically collect other useful data, such as the stack pointer.
During the readback, the frame can be set by the number, as shown in block 66, or by the value of the program counter at the tracepoint. The system can also allow searching of the buffer for a given frame. For example, a frame where X=4, or the second frame storing data for a given tracepoint can be found.
FIGS. 4A and 4B illustrates details of the example of FIG. 3. FIG. 4A illustrates evaluating of the user requests. In block 72, the request for collecting Q[X+Y] is created. This is sent to the debugger 74 which evaluates the symbol and address table 76. The debugger 74 then sends instructions to the debugger agent 78. The debugger agent then produces a table of memory locations from which data is to be obtained to store in the buffer. For example, “store the contents of address 0500 into the buffer at the frame start address +1”. This will cause the value of X to be stored in the buffer. In the next step, the contents of address 0501 is stored into the buffer at frame start address +2. In the next step. the contents of the address 0500 and the contents of address 0501 are added to the contents of address 0502 to get the address of the desired array location. Note that if the array data size was greater than one, the contents of the addresses 0500 and 0501 would be multiplied by this array data size. In the next step, the contents of the address, the array data, is stored at the frame start address +3.
Looking at FIG. 4, the user can set the frame of the buffer to five, and request the data “Q[X+Y]”. This will cause the debugger 74 to check the address and symbol table 76 and request the values for X and Y, addresses 0500 and 0501. at the fifth frame. The debugger agent will pull the X and Y values from the buffer and send this data to the debugger. The debugger will use the values of X and Y to calculate the address of Q[X+Y], and request that the debugging agent provide the contents of this address. The debugger agent 78 sends value of Q[X+Y] contained in the fourth data element of frame 5, to the debugger 74. The debugger 74 displays the value of Q[X+Y] in step 82. Note that programming abstractions, such as the variables, can be used in both the input and display of the tracepoint data.
The system preferably has a collect mode that conveniently allows for the subroutine call stack to be collected when a tracepoint is hit. In this preferred embodiment, the system determines from the collected call stack which program called which, and what were the arguments sent. In a similar manner to that described with respect to FIG. 3, the debugging system can use a representation of the program calls and their arguments, using programming abstractions, without requiring the user to sift through a hexadecimal representation of data.
In addition to arrays, records can be stored and displayed at a tracepoint event. Records are a programming abstraction of an arrangement of multiple data structures grouped. All or portions of the record can be stored and displayed by the system.
In another embodiment of the present invention, the system will allow step-through instructions. Step-through instructions will cause the system to produce a number of tracepoint events in a row, collecting a set of data at each tracepoint. For example, the next n instructions executed can be replaced with a tracepoint. This will allow the programmer to step through the tracepoints to show the memory values at consecutively executed instructions. This can be done even though the actual program is long finished. An advantage that is not possible with breakpoints is that the step-though operation for tracepoints will allow the user to step backwards. This isn't done with breakpoints, because it is difficult to reset the state of the computer once an operation has occurred.
In a preferred embodiment, the debugger system allows for breakpoints as well as the tracepoints, and the input and display are similar for both the breakpoints and the tracepoints.
Appendix I illustrates additional examples of how the tracepoint system of the present invention operates. In particular, Appendix I describes one embodiment of the interface of the present invention used in the GNU symbolic debugger.
Consider an example of how the debugging system of the present invention with the tracepoints operates. To test for year 2000 problems, an experiment can be run in which the clock can be run past the year 2000, and it is checked what happens to the software, such as phone switch software. The system can be set up with the tracepoints, and then run late at night with no software engineer around so that the phone switch system can be run during the day. In the morning, long after the experiment is over, a software engineer can examine the data collected by the tracepoints, and then determine what happened during the operation of the program.
The advantage of storing the data in a buffer at the target system is that the system can quickly store the data required. If, for example, a system is required to send the data to the host, this can change the timing of the host program and cause serious errors, or might actually cause the program to behave correctly when in fact, during the actual operation during the year 2000, errors will occur.
It will be appreciated by those of ordinary skill in the art that the invention can be embodied in other specific forms without departing from the spirit or essential character thereof. The presently disclosed embodiments are therefor considered in all respects to be illustrative and not restrictive. The scope of the invention is indicated by the appended claims, rather than the foregoing description, and all changes which come within the meaning and range of equivalence thereof are intended to be embraced therein.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US4205370||Apr 16, 1975||May 27, 1980||Honeywell Information Systems Inc.||Trace method and apparatus for use in a data processing system|
|US5067073||Aug 2, 1988||Nov 19, 1991||International Business Machines Corporation||Embedded tracing method for identifying program executed paths|
|US5121489||Jun 27, 1991||Jun 9, 1992||International Business Machines Corporation||Tracing method for identifying program execution paths using a trace points bit map with one-to-one correspondence with embedded trace points|
|US5127103||Nov 16, 1990||Jun 30, 1992||North American Philips Corporation||Real-time tracing of dynamic local data in high level languages in the presence of process context switches|
|US5161216||Mar 8, 1989||Nov 3, 1992||Wisconsin Alumni Research Foundation||Interprocedural slicing of computer programs using dependence graphs|
|US5414855||Aug 10, 1993||May 9, 1995||International Business Machines Corporation||Language compiler|
|US5442740||Jul 13, 1993||Aug 15, 1995||International Business Machines Corporation||Method and apparatus for visual display of program performance trace data|
|US5689636||Sep 28, 1994||Nov 18, 1997||Siemens Aktiengesellschaft||Tracer system for error analysis in running real-time systems|
|US5737521||Sep 20, 1994||Apr 7, 1998||Siemens Aktiengesellschaft||Tracer system for analyzing errors in running real-time systems|
|US5740351||Sep 13, 1995||Apr 14, 1998||Lucent Technologies Inc.||Apparatus and method for debugging/modifying ROM-based software systems employing and extensible interpreter|
|US5815653||Nov 13, 1995||Sep 29, 1998||You; Lawrence L.||Debugging system with portable debug environment-independent client and non-portable platform-specific server|
|US5819093||Mar 3, 1995||Oct 6, 1998||Sun Microsystems, Inc.||System and method for a distributed debugger for debugging distributed application programs|
|US5835699||Jun 16, 1997||Nov 10, 1998||Nec Corporation||Breakpoint setting/deleting system using a symbolic debugger in a digital data processing system|
|US5850550||Aug 31, 1995||Dec 15, 1998||International Business Machine Corporation||No preprocessor and a source level debugger for embedded SQL in a 3GL|
|US5870606 *||May 1, 1996||Feb 9, 1999||International Business Machines Corp.||Data triggered trace technique for debugging software programs|
|US5892941 *||Apr 29, 1997||Apr 6, 1999||Microsoft Corporation||Multiple user software debugging system|
|US5896536||May 1, 1996||Apr 20, 1999||International Business Machines Corp.||Data triggered trace support for debugging object oriented programs|
|US5978584||Jun 19, 1997||Nov 2, 1999||Matsushita Electric Industrial Co., Ltd.||Debugging apparatus for debugging a program by changing hardware environments without changing program operation state|
|US6042614||Jan 9, 1998||Mar 28, 2000||Sun Microsystems, Inc.||System and method for a distributed debugger for debugging distributed application programs|
|US6161216 *||Apr 29, 1998||Dec 12, 2000||Emc Corporation||Source code debugging tool|
|US6282701 *||Jul 30, 1998||Aug 28, 2001||Mutek Solutions, Ltd.||System and method for monitoring and analyzing the execution of computer programs|
|US6311326 *||Jan 4, 1999||Oct 30, 2001||Emc Corporation||Online debugging and tracing system and method|
|US6526567 *||Aug 16, 1999||Feb 25, 2003||International Business Machines Corporation||System and method for optimizing a device driver by incorporating debugging and tracing|
|EP1150466A2 *||Apr 5, 2001||Oct 31, 2001||Hewlett-Packard Company||Halting data strobes on a source synchronous link and utilization of same to debug data capture problems|
|1||Gertner et al., "High level debugging in parasight," DARPA, pp. 151-162 No Publication Date.|
|2||Roland Wisüller, et al. "Debugging of Globally Optimized Programs Using Data Flow Analysis" SIGPLAN 94-6/94 Orlando, Florida USA. 1994 ACM 0-89791-662-x94/0006 pp. 278-289.|
|3||Rotenberg et al., "Control independence in trace processors," IEEE, pp. 4-15, 1999.|
|4||Sameer Shende, et al. "Event and State-Based Debugging in TAW: A Prototype" SPDT '96 Philadelphia PA, USA. 1996 ACM 0-89791-846-0/96/05 pp. 21-30.|
|5||Shende et al., Event and state based debugging in TAU: a prototype,: ACM SPDT, pp. 21-30, 1996.|
|6||Wismuller, "Debugging of globally optimized programs using data flow analysis," ACM SIGPLAN, pp. 278-289, 1994.|
|7||Zinky et al., "Visualizing packet traces," ACM COMM, pp. 293-304, Aug. 1992.|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US6892325 *||Nov 27, 2001||May 10, 2005||International Business Machines Corporation||Method for displaying variable values within a software debugger|
|US6941492 *||Feb 5, 2002||Sep 6, 2005||Emc Corporation||Debugging tool for efficient switching between targets in a multi-processor environment|
|US7055140 *||May 1, 2002||May 30, 2006||Seiko Epson Corporation||Software breakpoints implementation via specially named function|
|US7233336||Oct 15, 2004||Jun 19, 2007||American Megatrends, Inc.||Systems and methods for capturing screen displays from a host computing system for display at a remote terminal|
|US7260624||Sep 20, 2002||Aug 21, 2007||American Megatrends, Inc.||Systems and methods for establishing interaction between a local computer and a remote computer|
|US7412625 *||May 27, 2003||Aug 12, 2008||American Megatrends, Inc.||Method and system for remote software debugging|
|US7418141||Mar 31, 2003||Aug 26, 2008||American Megatrends, Inc.||Method, apparatus, and computer-readable medium for identifying character coordinates|
|US7454490||Jun 14, 2004||Nov 18, 2008||American Megatrends, Inc.||In-line video, keyboard and mouse remote management unit|
|US7467374 *||Nov 5, 2003||Dec 16, 2008||Microsoft Corporation||Serialization for structured tracing in managed code|
|US7519749||Aug 25, 2004||Apr 14, 2009||American Megatrends, Inc.||Redirecting input and output for multiple computers|
|US7543277||Jun 24, 2004||Jun 2, 2009||American Megatrends, Inc.||Method and system for remote software debugging|
|US7546584||Jun 16, 2003||Jun 9, 2009||American Megatrends, Inc.||Method and system for remote software testing|
|US7783799||Aug 31, 2006||Aug 24, 2010||American Megatrends, Inc.||Remotely controllable switch and testing methods using same|
|US7793019||Feb 27, 2009||Sep 7, 2010||American Megatrends, Inc.||Redirecting input and output for multiple computers|
|US7827258||Mar 1, 2004||Nov 2, 2010||American Megatrends, Inc.||Method, system, and apparatus for communicating with a computer management device|
|US7840728||Feb 27, 2009||Nov 23, 2010||American Megatrends, Inc.||Redirecting input and output for multiple computers|
|US7861020||Feb 27, 2009||Dec 28, 2010||American Megatrends, Inc.||Redirecting input and output for multiple computers|
|US7945899||May 22, 2009||May 17, 2011||American Megatrends, Inc.||Method and system for remote software testing|
|US7954088 *||Mar 23, 2005||May 31, 2011||Microsoft Corporation||Method and apparatus for executing unit tests in application host environment|
|US7979610||Aug 13, 2010||Jul 12, 2011||American Megatrends, Inc.||Remotely controllable switch and testing methods using same|
|US8001302||Nov 17, 2010||Aug 16, 2011||American Megatrends, Inc.||Redirecting input and output for multiple computers|
|US8010843||Dec 14, 2005||Aug 30, 2011||American Megatrends, Inc.||System and method for debugging a target computer using SMBus|
|US8046743||Apr 17, 2009||Oct 25, 2011||American Megatrends, Inc.||Method and system for remote software debugging|
|US8359384||Sep 24, 2010||Jan 22, 2013||American Megatrends, Inc.||Method, system, and apparatus for communicating with a computer management device|
|US8539435||Apr 4, 2011||Sep 17, 2013||American Megatrends, Inc.||Method and system for remote software testing|
|US8566644||Jul 14, 2011||Oct 22, 2013||American Megatrends, Inc.||System and method for debugging a target computer using SMBus|
|US8640114||Sep 7, 2006||Jan 28, 2014||Oracle America, Inc.||Method and apparatus for specification and application of a user-specified filter in a data space profiler|
|US8694970 *||Jun 2, 2005||Apr 8, 2014||Seagate Technology Llc||Unified debug system with multiple user-configurable trace volumes and trace buffers|
|US8762951||Mar 21, 2007||Jun 24, 2014||Oracle America, Inc.||Apparatus and method for profiling system events in a fine grain multi-threaded multi-core processor|
|US8769517||Mar 15, 2002||Jul 1, 2014||International Business Machines Corporation||Generating a common symbol table for symbols of independent applications|
|US8813055 *||Nov 8, 2006||Aug 19, 2014||Oracle America, Inc.||Method and apparatus for associating user-specified data with events in a data space profiler|
|US8898638||Sep 22, 2011||Nov 25, 2014||American Megatrends, Inc.||Method and system for remote software debugging|
|US8935675 *||Sep 25, 2013||Jan 13, 2015||Google Inc.||Statistical sampling of event monitoring triggers under overhead constraints|
|US20020178402 *||Jun 28, 2001||Nov 28, 2002||Kenny Tsai||System and method for software diagnosis|
|US20030101379 *||Nov 27, 2001||May 29, 2003||International Business Machines Corporation||Method for displaying variable values within a software debugger|
|US20030177419 *||Mar 15, 2002||Sep 18, 2003||International Business Machines Corporation||Facilitating the debugging of applications by employing user defined or redefined symbols|
|US20030208745 *||May 1, 2002||Nov 6, 2003||Juraj Bystricky||Software breakpoints implementation via specially named function|
|US20040059782 *||Sep 20, 2002||Mar 25, 2004||American Megatrends, Inc.||Systems and methods for establishing interaction between a local computer and a remote computer|
|US20040190773 *||Mar 31, 2003||Sep 30, 2004||American Megatrends, Inc.||Method, apparatus, and computer-readable medium for identifying character coordinates|
|US20040222944 *||Jun 14, 2004||Nov 11, 2004||American Megatrands, Inc.||In-line video, keyboard and mouse remote management unit|
|US20040243883 *||May 27, 2003||Dec 2, 2004||American Megatrends, Inc.||Method and system for remote software debugging|
|US20040255276 *||Jun 16, 2003||Dec 16, 2004||Gene Rovang||Method and system for remote software testing|
|US20050046637 *||Oct 15, 2004||Mar 3, 2005||American Megatrends, Inc.||Systems and methods for capturing screen displays from a host computing system for display at a remote terminal|
|US20050097110 *||Nov 5, 2003||May 5, 2005||Microsoft Corporation||Serialization for structured tracing in managed code|
|US20060218446 *||Mar 23, 2005||Sep 28, 2006||Microsoft Corporation||Method and apparatus for executing unit tests in application host environment|
|US20060277441 *||Jun 2, 2005||Dec 7, 2006||Seagate Technology Llc||Unified debug system with multiple user-configurable trace volumes and trace buffers|
|US20070168746 *||Dec 14, 2005||Jul 19, 2007||Stefano Righi||System and method for debugging a target computer using SMBus|
|US20080109796 *||Nov 8, 2006||May 8, 2008||Nicolai Kosche||Method and Apparatus for Associating User-Specified Data with Events in a Data Space Profiler|
|US20080127107 *||Sep 7, 2006||May 29, 2008||Sun Microsystems, Inc.||Method and apparatus for specification and application of a user-specified filter in a data space profiler|
|US20090235122 *||May 22, 2009||Sep 17, 2009||Gene Rovang||Method and System for Remote Software Testing|
|US20110015918 *||Sep 24, 2010||Jan 20, 2011||American Megatrends, Inc.||Method, system, and apparatus for communicating with a computer management device|
|US20110066773 *||Nov 17, 2010||Mar 17, 2011||American Megatrends, Inc.||Redirecting input and output for multiple computers|
|US20110191752 *||Jan 29, 2010||Aug 4, 2011||Christophe Cleraux||Method and System for Debugging of Software on Target Devices|
|US20110197473 *||Apr 28, 2011||Aug 18, 2011||Adidas International Marketing B.V.||Sole element for a shoe|
|WO2009082379A2 *||Nov 27, 2007||Jul 2, 2009||Sourcecode Technology Holding, Inc.||Methods and apparatus for debugging a workflow process|
|WO2009082379A3 *||Nov 27, 2007||Oct 15, 2009||Sourcecode Technology Holding, Inc.||Methods and apparatus for debugging a workflow process|
|U.S. Classification||717/128, 717/129, 714/E11.21, 714/35, 714/E11.212, 714/38.11|
|International Classification||G06F11/36, G06F9/44|
|Apr 14, 2003||AS||Assignment|
Owner name: RED HAT, INC., NORTH CAROLINA
Free format text: MERGER;ASSIGNOR:CYGNUS SOLUTIONS;REEL/FRAME:013951/0144
Effective date: 20000525
|Sep 20, 2007||FPAY||Fee payment|
Year of fee payment: 4
|Sep 19, 2011||FPAY||Fee payment|
Year of fee payment: 8
|Dec 9, 2015||FPAY||Fee payment|
Year of fee payment: 12